-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

GF,

GF wrote:
|> I believe if your session starts through HTTPS, the cookie will be
|> marked as secure and it won't be sent if the user switches to non-secure
|> HTTP.
|
| Maybe my question is stupid, but, is it possible to browse a site on
| HTTP and having just the JSESSIONID cookie sent on HTTPS to prevent
| session stealing?

Do you mean you want to configure Tomcat such that cookies are only sent
via HTTPS and suppressed for all HTTP traffic?

If yes, then I already told you how to do it: just make sure that your
cookies are created during an HTTPS request and that should be all you need.

If you need your HTTP requests to be related to the same server-side
session, then this is not going to work out for you.

With regard to session stealing... someone on the list recently asked if
Tomcat could be configured to ignore JSESSIONID cookies even if
"cookies" had been turned off in the configuration. I believe the answer
was that Tomcat will use a cookie if it was found, so an attacker could
always send JSESSIONID cookies to you just looking to see if he hits a
valid one.

If you really want to get paranoid, you can create a filter that vetos
all requests that contain a JSESSIONID cookie but don't use the HTTPS
scheme.

- -chris

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkeOfTIACgkQ9CaO5/Lv0PDgQgCgvyQN73aBeJ7EQJZIV4EfjkfQ
i+0AoMQUCGyc+LKjAvgzoM6cbTyGG+fa
=LzGc
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to